Skip to content
Threat Feed

April 2026 (30)

medium advisory

Rack::Static Information Disclosure Vulnerability (CVE-2026-34785)

Rack versions prior to 2.2.23, 3.1.21, and 3.2.6 are vulnerable to information disclosure due to improper static file serving via a prefix matching issue in Rack::Static.

rack information-disclosure CVE-2026-34785 ruby webserver
2r 1t 1c
high advisory

Balena Etcher for Windows TOCTOU Vulnerability

A Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability in Balena Etcher for Windows prior to v2.1.4 allows attackers to escalate privileges and execute arbitrary code by replacing a legitimate script with a crafted payload during the flashing process.

privilege-escalation toctou balena-etcher
2r 1t 1c
medium advisory

Huimeicloud hm_editor Server-Side Request Forgery Vulnerability (CVE-2026-5346)

A server-side request forgery (SSRF) vulnerability exists in huimeicloud hm_editor up to version 2.2.3, allowing remote attackers to manipulate the 'url' argument in the client.get function of src/mcp-server.js to potentially access internal resources.

cve-2026-5346 ssrf huimeicloud
2r 1t 1c
high advisory

Endian Firewall Arbitrary File Deletion via Path Traversal (CVE-2026-34790)

Endian Firewall versions 3.3.25 and prior allow authenticated users to delete arbitrary files due to a path traversal vulnerability in the `remove ARCHIVE` parameter of the `/cgi-bin/backup.cgi` script, leading to unauthorized file system modification.

cve path-traversal file-deletion web-application
2r 1t 1c
critical advisory

Endian Firewall Command Injection Vulnerability (CVE-2026-34791)

Endian Firewall version 3.3.25 and prior allows authenticated users to execute arbitrary OS commands due to an OS command injection vulnerability in the DATE parameter of the /cgi-bin/logs_proxy.cgi endpoint.

command-injection rce vulnerability
2r 1t 1c
medium advisory

Suricata DCERPC Buffering Inefficiency Vulnerability (CVE-2026-31937)

Suricata versions prior to 7.0.15 are vulnerable to CVE-2026-31937, where inefficient DCERPC buffering can lead to a denial-of-service condition through performance degradation.

vulnerability dos suricata
2r 1t 1c
medium advisory

Suricata HTTP2 Continuation Frame Flooding Denial of Service (CVE-2026-31935)

A denial of service vulnerability, CVE-2026-31935, exists in Suricata versions prior to 7.0.15 and 8.0.4, where flooding the system with crafted HTTP2 continuation frames leads to memory exhaustion and process termination.

cve dos http2 suricata
2r 1t 1c
high threat

SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0

A SQL injection vulnerability exists in itsourcecode Online Enrollment System 1.0 within the Parameter Handler component at /enrollment/index.php, where manipulating the deptid argument can lead to remote code execution, with public exploits available.

exploited sql-injection web-application cve-2026-5334
2r 1t 1c
high advisory

DefaultFuction CMS 1.0 Command Injection Vulnerability (CVE-2026-5333)

DefaultFuction Content-Management-System 1.0 is vulnerable to command injection via manipulation of the 'host' argument in the /admin/tools.php file, allowing remote attackers to execute arbitrary commands.

command-injection web-application cve-2026-5333
2r 2t 1c
medium advisory

Suricata DoS Vulnerability (CVE-2026-31933)

Specially crafted network traffic can cause Suricata to slow down, leading to a denial-of-service condition in versions prior to 7.0.15 and 8.0.4, as identified by CVE-2026-31933.

dos suricata cve-2026-31933 network
2r 1t 1c
medium advisory

Suricata KRB5 Buffering Inefficiency Vulnerability (CVE-2026-31932)

An unauthenticated attacker can exploit CVE-2026-31932, a vulnerability in Suricata versions prior to 7.0.15 and 8.0.4, to cause performance degradation due to inefficient KRB5 buffering.

cve-2026-31932 suricata krb5 performance-degradation denial-of-service
2r 1t 1c
medium advisory

Suricata NULL Dereference Vulnerability

Suricata versions 8.0.0 to before 8.0.4 are vulnerable to a NULL dereference crash when using the 'tls.alpn' rule keyword, potentially leading to a denial of service.

suricata denial-of-service null-dereference
2r 2t 1c
critical advisory

ShareFile Storage Zones Controller Unauthenticated Configuration Access and Potential RCE (CVE-2026-2699)

An unauthenticated attacker can access restricted configuration pages in Customer Managed ShareFile Storage Zones Controller (SZC), leading to system configuration changes and potential remote code execution.

sharefile storage-zones-controller rce cve-2026-2699
2r 2t 2i
critical advisory

ShareFile Storage Zones Controller Unauthenticated Remote Code Execution via File Upload (CVE-2026-2701)

Authenticated users can upload malicious files to a ShareFile Storage Zones Controller server and execute them, leading to remote code execution, due to improper neutralization of special elements, code generation, and unrestricted file upload.

rce file-upload sharefile
2r 1t
high advisory

OpenSTAManager Time-Based Blind SQL Injection Vulnerability

OpenSTAManager versions before 2.10.2 are susceptible to time-based blind SQL injection via the 'options[stato]' GET parameter, allowing authenticated attackers to extract sensitive database information.

openstamanager sqli cve-2026-28805
2r 1t
critical threat

BRICKSTORM Malware Targeting VMware vSphere Environments

The BRICKSTORM malware targets VMware vSphere environments, specifically vCenter Server Appliance (VCSA) and ESXi hypervisors, by exploiting weak security configurations to establish persistence at the virtualization layer, leading to administrative control and potential data exfiltration.

BRICKSTORM vsphere virtualization persistence lateral-movement
2r 2t
low advisory

Unusual City for Azure Activity Logs Event

A machine learning job detected Azure Activity Logs activity that, while not inherently suspicious or abnormal, is sourcing from a geolocation (city) that is unusual for the event action, indicating potential compromised credentials.

azure cloud anomaly-detection
2r 3t
low advisory

Spike in Successful Logon Events from a Source IP

A machine learning job detected a spike in successful authentication events from a source IP address, which can indicate password spraying, user enumeration, or brute force activity, potentially leading to credential access.

credential-access defense-evasion brute-force password-spraying
2r 3t
high advisory

Keycloak Denial-of-Service Vulnerability via Excessive Scope Parameter (CVE-2026-4634)

An unauthenticated attacker can cause a denial-of-service on Keycloak servers by sending a crafted POST request to the OIDC token endpoint with an excessively long scope parameter, leading to high resource consumption.

cve-2026-4634 denial-of-service keycloak
2r 1t 1c
high advisory

Keycloak UMA Policy Bypass Vulnerability (CVE-2026-4636)

CVE-2026-4636 describes a vulnerability in Keycloak where an authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation, leading to unauthorized access to victim-owned resources.

keycloak uma policy-bypass privilege-escalation
2r 3t 1c
high advisory

Keycloak Authorization Code Forging Vulnerability (CVE-2026-4282)

An unauthenticated attacker can exploit CVE-2026-4282 in Keycloak's SingleUseObjectProvider to forge authorization codes, leading to privilege escalation and the creation of admin-capable access tokens.

keycloak privilege-escalation authorization
2r 1t 1c
medium advisory

Keycloak Redirect URI Bypass Vulnerability (CVE-2026-3872)

CVE-2026-3872 is a vulnerability in Keycloak that allows an attacker controlling a path on the same web server to bypass URI redirect validation using a wildcard, potentially leading to access token theft and information disclosure.

keycloak redirect-uri-bypass cve-2026-3872 authentication authorization
2r 1t 1c
high advisory

DeepLoad Malware Distributed via ClickFix

The DeepLoad malware steals credentials, installs malicious browser extensions, spreads via USB drives, and is being distributed via ClickFix campaigns using PowerShell loaders.

deepload clickfix credential-theft windows
2r 3t
high advisory

SillyTavern Path Traversal Vulnerability in Chat Endpoints

A path traversal vulnerability in SillyTavern versions 1.16.0 and earlier allows an authenticated attacker to read and delete arbitrary files under their user data root by manipulating the avatar_url parameter in the `/api/chats/export` and `/api/chats/delete` endpoints.

path-traversal web-application sillytavern
3r 4t
medium advisory

SSH Authorized Key File Modification Inside a Container

The rule detects the creation or modification of an authorized_keys file inside a container, a technique used by adversaries to maintain persistence on a victim host by adding their own public key(s) to enable unauthorized SSH access for lateral movement or privilege escalation.

container persistence lateral-movement privilege-escalation ssh
2r 4t
high threat

TrueConf Zero-Day Exploitation Leading to Arbitrary Code Execution

Hackers exploited a zero-day vulnerability (CVE-2026-3502) in TrueConf conference servers to execute arbitrary files on connected endpoints, potentially deploying the Havoc C2 framework.

exploited TrueChaos trueconf zero-day cve-2026-3502 supply-chain attack
2r 3t 1c 4i
low advisory

Unusual Spike in Bytes Written to External Device Detected by Machine Learning

A machine learning job has detected a spike in bytes written to an external device, which is anomalous and can signal illicit data copying or transfer activities, potentially leading to data exfiltration.

data exfiltration machine learning external device
2r 1t
critical advisory

Unauthenticated SQL Injection Vulnerability in mb24api Endpoint (CVE-2026-33616)

CVE-2026-33616 describes an unauthenticated blind SQL Injection vulnerability affecting an mb24api endpoint, which a remote attacker can exploit by injecting special elements into a SQL SELECT command, potentially leading to a total loss of confidentiality due to improper neutralization of special elements.

sql-injection cve-2026-33616 web-application
2r 1t 1c
critical advisory

Unauthenticated SQL Injection Vulnerability in getinfo Endpoint (CVE-2026-33614)

An unauthenticated SQL Injection vulnerability (CVE-2026-33614) in the getinfo endpoint allows a remote attacker to execute arbitrary SQL commands due to improper neutralization of special elements, potentially leading to a total loss of confidentiality.

sql-injection vulnerability web-application
2r 1t 1c
critical advisory

Unauthenticated SQL Injection Vulnerability in setinfo Endpoint

An unauthenticated remote attacker can exploit a SQL Injection vulnerability (CVE-2026-33615) in the setinfo endpoint by injecting malicious code into a SQL UPDATE command, leading to a total loss of integrity and availability.

sql-injection vulnerability web-application
2r 1t 1c 2i